The ghost of Stuxnet past

Posted by   Virus Bulletin on   Mar 11, 2015

Microsoft patches .LNK vulnerability after 2010 patch was found to be incomplete.

Mention Stuxnet and you'll have many a security researcher's attention. The worm, which was discovered in 2010, used a number of zero-day vulnerabilities to reach its target: air-gapped Windows PCs at the Natanz nuclear plant in Iran. Most prominent among these was CVE-2010-2568, which allowed an attacker to execute remote code through a specially crafted .LNK file.

The vulnerability could be triggered by plugging an infected USB drive into a vulnerable PC, thus allowing an attacker to bridge air gaps. Researchers from Kaspersky have since found that the same exploit was used by the 'Equation Group' even before Stuxnet.

Microsoft patched the vulnerability in August 2010, but earlier this year researchers from HP's Zero Day Initiative discovered that the patch was insufficient and still left an attack surface open.

The vulnerability was privately disclosed to Microsoft, who in yesterday's Patch Tuesday release, patched this vulnerability, while HP published a lengthy blog post with full details on this new vulnerability. It has been assigned CVE number CVE-2015-0096.

Chances are you don't run a nuclear plant. That doesn't mean you shouldn't patch this vulnerability though: the original vulnerability is still widely used by malware to trick an unpatched Windows PC into executing malicious libraries.

For the more paranoid, it is good to note that while the 2010 patch didn't fully solve the issue (and, speaking to Ars Technica, HP's Brian Gorenc said "it's hard to believe that somebody didn't know about this bug prior to it being patched today"), the workaround provided by Microsoft back in 2010 would have prevented further exploitation. It may still be a good idea to apply it on critical systems as its only impact is that shortcut icons will not be displayed.

  The work around involves disabling .LNK files from having their icons displayed.

This isn't the only reason to apply Microsoft's patches though: no fewer than five out of the 14 bulletins are rated 'critical', while another bulletin patches the FREAK vulnerability. For those who prefer their security information in audio format, Johannes Ullrich's excellent daily ISC Stormcast podcast provides a brief summary of the important issues.

On the subject of Stuxnet, I can't recommend Kim Zetter's book Countdown to Zero Day highly enough. I reviewed it for this blog last year.

Posted on 11 March 2015 by Martijn Grooten

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

New article: Dissecting the design and vulnerabilities in AZORult C&C panels

In a new article, Aditya K Sood looks at the command-and-control (C&C) design of the AZORult malware, discussing his team's findings related to the C&C design and some security issues they identified.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.